Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 01:01
Static task
static1
Behavioral task
behavioral1
Sample
c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe
Resource
win7-20240903-en
General
-
Target
c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe
-
Size
1.0MB
-
MD5
0ef38dbc5d7d1d22974c3d4d3a201467
-
SHA1
60217cdeee89ba6129b367ef7b17f113438d86b9
-
SHA256
c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf
-
SHA512
cba0a9bebb9215d901ffb306f402a83b7fa03da5deed4bd45a326b440b026cab9bcf4f30bb02cf485bc427bbb9077aa56ce516e9d03916eb0c9c9b42bd6eca2c
-
SSDEEP
12288:RUaYxiov1kJQaAdVWlbQeep6tgUDs3thCa9abuLNihYS0UvHZrm:RUaLoNbHI9465YthCag+shGM
Malware Config
Extracted
amadey
3.70
98844c
http://79.137.203.19
-
install_dir
aee1d75f06
-
install_file
oneetx.exe
-
strings_key
702c2e1ea76ddd4af8e80d8cf9ace72f
-
url_paths
/7hgd5fx4/index.php
Signatures
-
Amadey family
-
Executes dropped EXE 3 IoCs
pid Process 2764 oneetx.exe 1836 oneetx.exe 2272 oneetx.exe -
Loads dropped DLL 2 IoCs
pid Process 2196 c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe 2196 c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2592 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2764 2196 c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe 31 PID 2196 wrote to memory of 2764 2196 c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe 31 PID 2196 wrote to memory of 2764 2196 c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe 31 PID 2196 wrote to memory of 2764 2196 c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe 31 PID 2764 wrote to memory of 2592 2764 oneetx.exe 32 PID 2764 wrote to memory of 2592 2764 oneetx.exe 32 PID 2764 wrote to memory of 2592 2764 oneetx.exe 32 PID 2764 wrote to memory of 2592 2764 oneetx.exe 32 PID 332 wrote to memory of 1836 332 taskeng.exe 36 PID 332 wrote to memory of 1836 332 taskeng.exe 36 PID 332 wrote to memory of 1836 332 taskeng.exe 36 PID 332 wrote to memory of 1836 332 taskeng.exe 36 PID 332 wrote to memory of 2272 332 taskeng.exe 38 PID 332 wrote to memory of 2272 332 taskeng.exe 38 PID 332 wrote to memory of 2272 332 taskeng.exe 38 PID 332 wrote to memory of 2272 332 taskeng.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe"C:\Users\Admin\AppData\Local\Temp\c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\aee1d75f06\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\aee1d75f06\oneetx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\aee1d75f06\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2592
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {57B096BC-2C61-457B-8C25-AC1BF4F61046} S-1-5-21-3533259084-2542256011-65585152-1000:XPAJOTIY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Users\Admin\AppData\Local\Temp\aee1d75f06\oneetx.exeC:\Users\Admin\AppData\Local\Temp\aee1d75f06\oneetx.exe2⤵
- Executes dropped EXE
PID:1836
-
-
C:\Users\Admin\AppData\Local\Temp\aee1d75f06\oneetx.exeC:\Users\Admin\AppData\Local\Temp\aee1d75f06\oneetx.exe2⤵
- Executes dropped EXE
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5a48c159f99aa015a2a97a72b1c6e464d
SHA16d92d0c66ea82424b920b5b5459231d5f25936c5
SHA256c7a24e90fe78220a3abc8a9f116836259878df3080fd955525b2a7e36e26ac82
SHA512ad4484f29ddaf0c50899b3227e5c82682e6517fc7ada785e491be41536768f4a2be648e08292f927ce023f1cc42076b847c44bc08a563bfaef26ee33abc9503e
-
Filesize
1.0MB
MD50ef38dbc5d7d1d22974c3d4d3a201467
SHA160217cdeee89ba6129b367ef7b17f113438d86b9
SHA256c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf
SHA512cba0a9bebb9215d901ffb306f402a83b7fa03da5deed4bd45a326b440b026cab9bcf4f30bb02cf485bc427bbb9077aa56ce516e9d03916eb0c9c9b42bd6eca2c